Introduction to Electromagnetic Information Security

Yu-ichi HAYASHI  Naofumi HOMMA  

Publication
IEICE TRANSACTIONS on Communications   Vol.E102-B   No.1   pp.40-50
Publication Date: 2019/01/01
Online ISSN: 1745-1345
DOI: 10.1587/transcom.2018EBI0001
Type of Manuscript: INVITED SURVEY PAPER
Category: Fundamental Theories for Communications
Keyword: 
EM information security,  TEMPEST,  side-channel attacks,  fault analysis,  hardware Trojan horse,  electromagnetic compatibility,  

Full Text: FreePDF(2.4MB)


Summary: 
With the rising importance of information security, the necessity of implementing better security measures in the physical layer as well as the upper layers is becoming increasing apparent. Given the development of more accurate and less expensive measurement devices, high-performance computers, and larger storage devices, the threat of advanced attacks at the physical level has expanded from the military and governmental spheres to commercial products. In this paper, we review the issue of information security degradation through electromagnetic (EM)-based compromising of security measures in the physical layer (i.e., EM information security). Owing to the invisibility of EM radiation, such attacks can be serious threats. We first introduce the mechanism of information leakage through EM radiation and interference and then present possible countermeasures. Finally, we explain the latest research and standardization trends related to EM information security.